Operations | Monitoring | ITSM | DevOps | Cloud

Security

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Proudly announcing Platform.sh's participation in the Data Privacy Framework (DPF)

As individuals become increasingly conscious of their personal data and how it is used, compliance with data protection regulations is a top priority for organizations worldwide. However, a challenge arose with cross-border transfers of personal data between the EU and the US following the Schrems II ruling by the Court of Justice of the European Union, leading to the creation of a new privacy framework.

How Machine Learning is Reshaping Your Business

Machine learning, a subset of artificial intelligence (AI), has emerged as a powerful tool for reshaping the landscape of business operations. By leveraging algorithms and statistical models, machine learning enables computers to learn from data and make predictions or decisions without explicit programming. In this blog, we'll delve into the transformative impact of machine learning on various aspects of business, from enhancing customer experience to driving innovation and ensuring data security.

How to Implement Zero Trust for Enhanced Cybersecurity: A Practical Guide

Implementing a robust cybersecurity strategy is not optional; it’s essential. Organizations must adopt effective measures to protect their sensitive data and systems. Yet, while companies recognize the value of a comprehensive approach like zero trust security, implementing it can seem overwhelming. With a straightforward guide detailing how to implement zero trust, your organization can take action to protect your resources — before a major security incident happens.

After a Ransomware Infection - Enhancing Security for Your Infrastructure Against Further Intrusion

In a previous blog, we outlined the essential steps that organizations should take within the first two days after the detection of a ransomware attack. In this follow-up post, we’ll discuss what an organization should do after the initial response to reduce the risks of future attacks. We’ll also highlight how Progress Flowmon can support ongoing network monitoring, early detection of attacks and reduction of further damage. Webinar: The First 48 Hours of Ransomware Incident Response.

Greater Control Over Windows Events for Qradar: Why Windows Events Matter

Windows events provide a wealth of security-relevant information, especially when they are correlated and analyzed within a SIEM like IBM Qradar. Whether you rely on MITRE ATT&CK, NIST, or another security framework, Windows Events are likely one of your higher volumes (EPS – Events Per Second) and represent your largest-sized events (Gigs per day – Storage and Archive).

Building a Privacy-First AI for Incident Management

At Rootly, we're integrating AI into incident management with a keen eye on privacy. It's not just about tapping into AI's potential; it's about ensuring we respect and protect our customers’ privacy and sensitive data. Here's a quick overview of how we're blending innovation with strong privacy commitments.

Addressing Cybersecurity Challenges in Cloud Computing

Cloud computing offers notable perks to businesses of all sizes. As reported by the CIO Agenda Survey by Gartner, adapting to cloud-based technology is one of the top business priorities. Cloud services assist companies in expanding their abilities. It also helps to reduce the cost of labor and capital expenditures for adapting to new technological solutions like managed third-party risk.

Security and Compliance Network Cyber Essentials

Best practices are key when approaching your cybersecurity and compliance strategy, any source of guidance is beneficial. The Cyber Essentials is a UK Government, industry-supported set of best practices introduced by the National Cyber Security Center (NCSC) to help organizations demonstrate operational security maturity.

7 Reasons Why You Need Data Loss Prevention For Your Business

Protecting sensitive data in an increasingly digital world is becoming more and more challenging. With organizations moving towards cloud-based infrastructure and the sheer amount of data collected continuing to increase, the need for robust data protection procedures is at an all-time high. IT Governance reported that in 2023, over 8 billion records were breached globally. And those are just those that were reported. Data loss prevention is now a necessity for your business.

How DEX Benefits IT & Security Operations: 5 Top Use Cases

I was recently explaining the importance of digital employee experience (DEX) management to a consultant who is a self-described "digital nomad" and works from wherever he pleases. The connection to DEX may not have entirely been clear, until I explained that his ability to easily do his work remotely using online tools exemplifies what good DEX is all about in the era of Everywhere Work.